We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Android Market Analysis with Activation Patterns
Teufl P., Kraxberger S., Orthacker C., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers
Android Security Permissions - Can we trust them?
Orthacker C., Teufl P., Kraxberger S., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers
Die physikalische Sicherheit eingebetteter Systeme
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 2012
Exploiting the Difference of Side-Channel Leakages
Hutter M., Kirschbaum M., Plos T., Schmidt J., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings.
Localized Electromagnetic Analysis of Cryptographic Implementations
Heyszl J., Mangard S., Heinz B., Stumpf F., Sigl G.
Cryptographers´ Track at the RSA Conference
Trusted Location Based Services
Teufl P., Zefferer T., Kreuzhuber S., Lesjak C.
7th International Conference for Internet Technology and Secured Transactions
Parameterized Synthesis
Bloem R., Jacobs S.
Tools and Algorithms for the Construction and Analysis of Systems
Open Source Bausteine als Kooperationsgrundlage
Posch R., Orthacker C., Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
E-Government - Zwischen Partizipation und Kooperation, Springer, 185-209, 2012
Vertrauenswürdiges Open Government Data
Stranacher K., Krnjic V., Zefferer T.
1.OGD D-A-CH-LI Konferenz
Usability-Evaluierung der österreichischen Handy-Signatur
Zefferer T., Krnjic V.
D-A-CH Security 2012
Towards User-friendly E-Government Solutions: Usability Evaluation of Austrian Smart-Card Integration Techniques
Zefferer T., Krnjic V.
Advancing Democracy, Government and Governance
The Prevalence of SAML within the European Union
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the 8th International Conference on Web Information Systems and Technologies
Improving the Security of SMS-Based Services Using Electronic Signatures
Zefferer T., Tauber A., Zwattendorfer B.
International Conference on Web Information Systems and Technologies
Usability Evaluation of Electronic Signature Based E-Government Solutions
Zefferer T., Krnjic V.
Proceedings of the IADIS International Conference WWW/INTERNET 2012
STORK - Technical Approach and Privacy
Leitold H., Posch R.
Digital Enlightenment Yearbook 2012, IOS Press, 289-306, 2012
Middleware Architecture for Cross-Border eID
Zwattendorfer B., Sumelong I., Leitold H.
International Conference on Information Assurance and Security
Synthesizing Robust Systems with RATSY
Bloem R., Gamauf H., Hofferek G., Könighofer B., Könighofer R.
Proceedings First Workshop on Synthesis (SYNT 2012)
